article thumbnail

Measure Security Performance, Not Policy Compliance

The Falcon's View

Specifically, if you think of policies as requirements, then you should be able to recast those as metrics and key performance indicators (KPIs) that are easily measured, and in turn are easily integrated into dashboards. Applied, this approach scales very nicely across the organization. But I have digressed.

article thumbnail

GUEST ESSAY: Top cybersecurity developments that can be expected to fully play out in 2019

The Last Watchdog

Still, Ransomware, zero-day exploits, and phishing attacks, were among the biggest threats facing IT security teams this year. The risk will rise and eventually this will cause more issues with a few headlines of devices that were used to hack networks. Related: WannaCry signals worse things to come. IoT security issues will increase.

article thumbnail

What is Vulnerability Scanning & How Does It Work?

eSecurity Planet

This allows you to determine which risks to eliminate first based on various factors, including their criticality and vulnerability threat levels, as well as classification. Findings are used to get a clear idea of the risks, factors, and threats levels. It also provides compliance reports, risk assessments, and threat monitoring.